Ó¡¶Èº½¿Õ¹«Ë¾Akasa AirÒòÅäÖôíÎóÓû§ÐÅϢй¶

Ðû²¼Ê±¼ä 2022-08-29
1¡¢Ó¡¶Èº½¿Õ¹«Ë¾Akasa AirÒòÅäÖôíÎóÓû§ÐÅϢй¶

      

ýÌå8ÔÂ25ÈÕ³Æ £¬Ó¡¶Èº½¿Õ¹«Ë¾Akasa Air·¢ÉúÊý¾Ýй¶ £¬Î´¾­ÊÚȨµÄ¸öÈ˿ɷÃÎÊÓû§ÐÅÏ¢¡£¸Ãº½¿Õ¹«Ë¾³Æ £¬8ÔÂ25ÈÕ·¢ÏÖÁËÒ»¸öÓëµÇ¼ºÍ×¢²á·þÎñÓйصļ¼ÊõÅäÖôíÎóÎÊÌâ £¬¿Éй¶ע²áÓû§ÐÅÏ¢ £¬°üÂÞÐÕÃû¡¢ÐԱ𡢵ç×ÓÓʼþµØÖ·ºÍµç»°ºÅÂë £¬ÇÒÕâЩÐÅÏ¢¿ÉÄÜÒѾ­±»Î´¾­ÊÚȨµÄ¸öÈË·ÃÎÊ¡£¸Ãº½¿Õ¹«Ë¾ÓÚ8ÔÂ7ÈÕ¿ªÊ¼ÔËÓª £¬ÏÖÔÚÒѾʹËÊÂÏòÆä¿Í»§ÖÂǸ £¬²¢ÏòCERT-In³ÂËß¡£


https://www.telegraphindia.com/business/akasa-air-suffers-data-breach/cid/1883016


2¡¢AtlassianÐÞ¸´BitbucketÖеÄRCE©¶´CVE-2022-36804 
      

8ÔÂ24ÈÕ £¬AtlassianÐû²¼Äþ¾²Í¨¸æ £¬ÐÞ¸´Bitbucket·þÎñÆ÷ºÍÊý¾ÝÖÐÐĵÄÄþ¾²Â©¶´£¨CVE-2022-36804£©¡£BitbucketÊÇÒ»¸ö»ùÓÚGitµÄ´úÂëÍйܡ¢¹ÜÀíºÍЭ×÷¹¤¾ß £¬¼¯³ÉÁËJiraºÍTrello¡£¸Ã©¶´ÊÇÈí¼þ²úÎïµÄ¶à¸öAPI¶ËµãÖеÄÃüÁî×¢Èë©¶´ £¬CVSSÆÀ·ÖΪ9.9 £¬¿Éͨ¹ýÌØÖÆµÄHTTPÇëÇóÀ´ÀûÓà £¬µ¼ÖÂÈÎÒâ´úÂëµÄÖ´ÐС£½¨ÒéÎÞ·¨Ó¦ÓÃÄþ¾²¸üеÄÓû§Í¨¹ýÉèÖÃfeature.public.access=false¹Ø±Õ¹«¹²´æ´¢¿âÀ´×÷Ϊ»º½â´ëÊ©¡£


https://thehackernews.com/2022/08/critical-vulnerability-discovered-in.html


3¡¢ÖÇÀû¹ú¼ÒÏû·ÑÕß·þÎñÖÐÐÄSERNACµÄÍøÕ¾±»¹¥»÷ºó¹Ø±Õ

      

¾Ý8ÔÂ27ÈÕ±¨µÀ £¬ÖÇÀû¹ú¼ÒÏû·ÑÕß·þÎñÖÐÐÄ(SERNAC)ÔÚ±»¹¥»÷ºó¹Ø±Õ¡£SERNACÊÇÖÇÀûÂôÁ¦Î¬»¤ºÍ´Ù½øÏû·ÑÕßȨÀûµÄ¹«¹²·þÎñ»ú¹¹ £¬ÔÚ·¢ÏÖ¹¥»÷ºóÒѽ«´ËʳÂË߸ø¼ì²ì¹Ù°ì¹«ÊÒ½øÐÐÐÌÊÂÊӲ졣SERNACÍøÕ¾ÏÔʾ¸ÃÍøÕ¾¼°Æäƽ̨ÕýÔÚά»¤ÖÐ £¬ÔÚÍøÕ¾ÎÞ·¨·ÃÎÊʱÏû·ÑÕß¿ÉÒÔµ½SERNAC·þÎñ´¦»òÕßͨ¹ýÖµç»ñµÃ·þÎñ¡£Ä¿Ç°ÒÑÈ·ÈÏÕâÊÇÒ»ÆðÀÕË÷¹¥»÷ʼþ £¬µ«ÖÇÀûÕþ¸®ÉÐδ˵Ã÷ËüÊÇʲôÀàÐ͵ÄÀÕË÷Èí¼þ¡£ 

https://www.databreaches.net/sernac-computer-services-hacked-chiles-interior-ministry-assessing-scope-of-cyberattack/


4¡¢DoorDashÓëÆäµÚÈý·½¹©Ó¦ÉÌÔ⵽ͬһºÚ¿ÍÍÅ»ïµÄ¹¥»÷

      

¾ÝýÌå8ÔÂ26ÈÕ±¨µÀ £¬Ê³Æ·ÅäË͹«Ë¾DoorDashÓйصĿͻ§ºÍÔ±¹¤Êý¾Ýй¶¡£DoorDashÌåÏÖ £¬¹¥»÷ÕßÀûÓÃÁË´ÓÆäµÚÈý·½¹©Ó¦ÉÌTwilio´¦ÇÔÈ¡µÄƾ¾Ý»ñµÃÁ˶Թ«Ë¾ÄÚ²¿¹¤¾ßµÄ·ÃÎÊȨÏÞ £¬À´·ÃÎʿͻ§ºÍÔ±¹¤µÄÊý¾Ý¡£Ð¹Â¶ÐÅÏ¢°üÂÞÓû§µÄÐÕÃû¡¢ÓʼþµØÖ·¡¢ÅäË͵ØÖ·¡¢µç»°ºÅÂëÒÔ¼°²¿ÃÅÖ§¸¶¿¨µÄºóËÄλ£»Ô±¹¤ÐÕÃû¡¢µç»°ºÅÂëºÍµç×ÓÓʼþµØÖ·¡£²»¾Ãºó £¬¸Ã¹«Ë¾³ÎÇå´Ë´Î»÷ÊÇÓɹ¥»÷TwilioµÄͬһÍÅ»ï½øÐеÄ £¬µ«²¢·ÇÊÇͨ¹ýTwilio¡£


https://www.bleepingcomputer.com/news/security/doordash-discloses-new-data-breach-tied-to-twilio-hackers/


5¡¢Trend Micro·¢ÏÖÕë¶ÔÑÇÖ޺ͷÇÖÞµÄÐÂÀÕË÷Èí¼þAgenda

      

Trend MicroÔÚ8ÔÂ25ÈÕÅû¶ÁËÕë¶ÔÑÇÖ޺ͷÇÖÞµÄÐÂÀÕË÷Èí¼þAgenda¡£¸ÃÀÕË÷Èí¼þÓÃÊÇÓÃGOÓïÑÔ¿ª·¢µÄ £¬Õë¶ÔÓ¡¶ÈÄáÎ÷ÑÇ¡¢É³Ìذ¢À­²®¡¢ÄϷǺÍÌ©¹úµÄÒ½ÁƱ£½¡ºÍ½ÌÓý×éÖ¯¡£Agenda¿ÉÒÔÔÚÄþ¾²Ä£Ê½ÏÂÖØÐÂÆô¶¯ÏµÍ³ £¬ÊÔͼֹͣÐí¶àÌØ¶¨µÄ·þÎñÆ÷½ø³ÌºÍ·þÎñ £¬²¢ÓжàÖÖģʽ¡£Ñо¿ÈËÔ±ÊÕ¼¯µÄÿ¸öÀÕË÷Èí¼þµÄÑù±¾¶¼ÊÇÎªÌØ¶¨Ä¿±ê¶¨ÖƵÄ £¬°üÂÞΨһµÄ¹«Ë¾IDºÍй¶µÄÕË»§ÐÅÏ¢¡£ÆäÊê½ðÒò¹«Ë¾¶øÒì £¬´Ó50000ÃÀÔªµ½800000ÃÀÔª²»µÈ¡£


https://www.trendmicro.com/en_us/research/22/h/new-golang-ransomware-agenda-customizes-attacks.html


6¡¢Î¢Èí͸¶APT29ÀûÓÃеÄMagicWeb½Ù³ÖADFSµÄ¹¥»÷»î¶¯

      

8ÔÂ24ÈÕ £¬Î¢ÈíÐû²¼Á˹ØÓÚ¶íÂÞ˹APT29½üÆÚ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£¹¥»÷ÖÐʹÓõÄжñÒ⹤¾ßMagicWebÊÇFoggyWebµÄÑݱä £¬¿ÉÓÃÀ´ÇÔÈ¡±»Ñ¬È¾µÄActive DirectoryÁªºÏ·þÎñ(ADFS)·þÎñÆ÷µÄÅäÖÃÊý¾Ý¿â £¬½âÃÜÁîÅÆÇ©ÃûºÍÁîÅÆ½âÃÜÖ¤Êé £¬²¢Í¨¹ýC2·þÎñÆ÷»ñÈ¡ÆäËüµÄpayload¡£MagicWeb¿É½«ADFSʹÓõĺϷ¨DLLÌæ»»Îª¶ñÒâµÄ°æ±¾ £¬À´²Ù¿ØÓû§Éí·ÝÑéÖ¤Ö¤Êé²¢Ð޸ı»Ñ¬È¾·þÎñÆ÷Éú³ÉµÄÁîÅÆÖÐͨ±¨µÄÉùÃ÷¡£MagicWeb¿ÉÒÔ×ÊÖúAPT29ÔÚWindowsÖÐÒÔËùÓÐÓû§µÄÉí·ÝµÇ¼¡£


https://www.microsoft.com/security/blog/2022/08/24/magicweb-nobeliums-post-compromise-trick-to-authenticate-as-anyone/